prompt
stringclasses
508 values
procedure
stringlengths
20
478
Boot or Logon Autostart Execution:Registry Run Keys
DarkComet adds several Registry entries to enable automatic execution at every system startup.
Boot or Logon Autostart Execution:Registry Run Keys
It has been known to establish persistence by adding programs to the Run Registry key.
Boot or Logon Autostart Execution:Registry Run Keys
DarkTortilla has established persistence via the Software\Microsoft\Windows NT\CurrentVersion\Run registry key and by creating a .lnk shortcut file in the Windows startup folder.
Boot or Logon Autostart Execution:Registry Run Keys
DnsSystem can write itself to the Startup folder to gain persistence.
Boot or Logon Autostart Execution:Registry Run Keys
DownPaper uses PowerShell to add a Registry Run key in order to establish persistence.
Boot or Logon Autostart Execution:Registry Run Keys
It has added the registry value ntdll to the Registry Run key to establish persistence.
Boot or Logon Autostart Execution:Registry Run Keys
DustySky achieves persistence by creating a Registry entry in HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run.
Boot or Logon Autostart Execution:Registry Run Keys
If establishing persistence by installation as a new service fails, one variant of Elise establishes persistence for the created .exe file by setting the following Registry key: HKCU\Software\Microsoft\Windows\CurrentVersion\Run\svchost : %APPDATA%\Microsoft\Network\svchost.exe. Other variants have set the following Registry keys for persistence: HKCU\Software\Microsoft\Windows\CurrentVersion\Run\imejp : [self] and HKCU\Software\Microsoft\Windows\CurrentVersion\Run\IAStorD.
Boot or Logon Autostart Execution:Registry Run Keys
Variants of Emissary have added Run Registry keys to establish persistence.
Boot or Logon Autostart Execution:Registry Run Keys
Emotet has been observed adding the downloaded payload to the HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run key to maintain persistence.
Boot or Logon Autostart Execution:Registry Run Keys
Empire can modify the registry run keys HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run and HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run for persistence.
Boot or Logon Autostart Execution:Registry Run Keys
EvilBunny has created Registry keys for persistence in [HKLM|HKCU]\…\CurrentVersion\Run.
Boot or Logon Autostart Execution:Registry Run Keys
EvilGrab adds a Registry Run key for ctfmon.exe to establish persistence.
Boot or Logon Autostart Execution:Registry Run Keys
EVILNUM can achieve persistence through the Registry Run key.
Boot or Logon Autostart Execution:Registry Run Keys
FatDuke has used HKLM\SOFTWARE\Microsoft\CurrentVersion\Run to establish persistence.
Boot or Logon Autostart Execution:Registry Run Keys
FELIXROOT adds a shortcut file to the startup folder for persistence.
Boot or Logon Autostart Execution:Registry Run Keys
It has established persistence by using the Registry option in PowerShell Empire to add a Run key.
Boot or Logon Autostart Execution:Registry Run Keys
It has used Windows Registry run keys such as, HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\hosts to maintain persistence.
Boot or Logon Autostart Execution:Registry Run Keys
It has used Registry Run keys to establish persistence for its downloader tools known as HARDTACK and SHIPBREAD.
Boot or Logon Autostart Execution:Registry Run Keys
It malware has created Registry Run and RunOnce keys to establish persistence, and has also added items to the Startup folder.
Boot or Logon Autostart Execution:Registry Run Keys
Final1stspy creates a Registry Run key to establish persistence.
Boot or Logon Autostart Execution:Registry Run Keys
FinFisher establishes persistence by creating the Registry key HKCU\Software\Microsoft\Windows\Run.
Boot or Logon Autostart Execution:Registry Run Keys
Flagpro has dropped an executable file to the startup directory.
Boot or Logon Autostart Execution:Registry Run Keys
FLASHFLOOD achieves persistence by making an entry in the Registry's Run key.
Boot or Logon Autostart Execution:Registry Run Keys
FlawedAmmyy has established persistence via the HKCU\SOFTWARE\microsoft\windows\currentversion\run registry key.
Boot or Logon Autostart Execution:Registry Run Keys
FunnyDream can use a Registry Run Key and the Startup folder to establish persistence.
Boot or Logon Autostart Execution:Registry Run Keys
It tools have registered Run keys in the registry to give malicious VBS files persistence.
Boot or Logon Autostart Execution:Registry Run Keys
Gazer can establish persistence by creating a .lnk file in the Start menu.
Boot or Logon Autostart Execution:Registry Run Keys
Gelsemium can set persistence with a Registry run key.
Boot or Logon Autostart Execution:Registry Run Keys
gh0st RAT has added a Registry Run key to establish persistence.
Boot or Logon Autostart Execution:Registry Run Keys
Gold Dragon establishes persistence in the Startup folder.
Boot or Logon Autostart Execution:Registry Run Keys
It malware can create a .lnk file and add a Registry Run key to establish persistence.
Boot or Logon Autostart Execution:Registry Run Keys
Grandoreiro can use run keys and create link files in the startup folder for persistence.
Boot or Logon Autostart Execution:Registry Run Keys
GRIFFON has used a persistence module that stores the implant inside the Registry, which executes at logon.
Boot or Logon Autostart Execution:Registry Run Keys
GrimAgent can set persistence with a Registry run key.
Boot or Logon Autostart Execution:Registry Run Keys
GuLoader can establish persistence via the Registry under HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce.
Boot or Logon Autostart Execution:Registry Run Keys
Hancitor has added Registry Run keys to establish persistence.
Boot or Logon Autostart Execution:Registry Run Keys
Helminth establishes persistence by creating a shortcut in the Start Menu folder.
Boot or Logon Autostart Execution:Registry Run Keys
Heyoka Backdoor can establish persistence with the auto start function including using the value EverNoteTrayUService.
Boot or Logon Autostart Execution:Registry Run Keys
Hi-Zor creates a Registry Run key to establish persistence.
Boot or Logon Autostart Execution:Registry Run Keys
It added a spoofed binary to the start-up folder for persistence.
Boot or Logon Autostart Execution:Registry Run Keys
HTTPBrowser has established persistence by setting the HKCU\Software\Microsoft\Windows\CurrentVersion\Run key value for wdm to the path of the executable. It has also used the Registry entry HKEY_USERS\Software\Microsoft\Windows\CurrentVersion\Run vpdn "%ALLUSERPROFILE%\%APPDATA%\vpdn\VPDN_LU.exe" to establish persistence.
Boot or Logon Autostart Execution:Registry Run Keys
IcedID has established persistence by creating a Registry run key.
Boot or Logon Autostart Execution:Registry Run Keys
It has maintained persistence by modifying Registry run key value HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\.
Boot or Logon Autostart Execution:Registry Run Keys
Some InnaputRAT variants establish persistence by modifying the Registry key HKU\\Software\Microsoft\Windows\CurrentVersion\Run:%appdata%\NeutralApp\NeutralApp.exe.
Boot or Logon Autostart Execution:Registry Run Keys
InvisiMole can place a lnk file in the Startup Folder to achieve persistence.
Boot or Logon Autostart Execution:Registry Run Keys
Ixeshe can achieve persistence by adding itself to the HKCU\Software\Microsoft\Windows\CurrentVersion\Run Registry key.
Boot or Logon Autostart Execution:Registry Run Keys
JCry has created payloads in the Startup directory to maintain persistence.
Boot or Logon Autostart Execution:Registry Run Keys
JHUHUGIT has used a Registry Run key to establish persistence by executing JavaScript code within the rundll32.exe process.
Boot or Logon Autostart Execution:Registry Run Keys
Kasidet creates a Registry Run key to establish persistence.
Boot or Logon Autostart Execution:Registry Run Keys
Kazuar adds a sub-key under several Registry run keys.
Boot or Logon Autostart Execution:Registry Run Keys
Several It backdoors achieved persistence by adding a Run key.
Boot or Logon Autostart Execution:Registry Run Keys
It has placed scripts in the startup folder for persistence and modified the HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce Registry key.
Boot or Logon Autostart Execution:Registry Run Keys
Koadic has added persistence to the HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run Registry key.
Boot or Logon Autostart Execution:Registry Run Keys
KOCTOPUS can set the AutoRun Registry key with a PowerShell command.
Boot or Logon Autostart Execution:Registry Run Keys
A version of KONNI has dropped a Windows shortcut into the Startup folder to establish persistence.
Boot or Logon Autostart Execution:Registry Run Keys
It has maintained persistence by loading malicious code into a startup folder or by adding a Registry Run key.
Boot or Logon Autostart Execution:Registry Run Keys
It has achieved persistence via writing a PowerShell script to the autorun registry key.
Boot or Logon Autostart Execution:Registry Run Keys
It has used JavaScript to create a shortcut file in the Startup folder that points to its main backdoor.
Boot or Logon Autostart Execution:Registry Run Keys
LiteDuke can create persistence by adding a shortcut in the CurrentVersion\Run Registry key.
Boot or Logon Autostart Execution:Registry Run Keys
LoJax has modified the Registry key ‘HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\BootExecute’ from ‘autocheck autochk ’ to ‘autocheck autoche ’ in order to execute its payload during Windows startup.
Boot or Logon Autostart Execution:Registry Run Keys
LookBack sets up a Registry Run key to establish a persistence mechanism.
Boot or Logon Autostart Execution:Registry Run Keys
Lucifer can persist by setting Registry key values HKLM\Software\Microsoft\Windows\CurrentVersion\Run\QQMusic and HKCU\Software\Microsoft\Windows\CurrentVersion\Run\QQMusic.
Boot or Logon Autostart Execution:Registry Run Keys
It has used malicious DLLs that setup persistence in the Registry Key HKCU\Software\Microsoft\Windows\Current Version\Run.
Boot or Logon Autostart Execution:Registry Run Keys
It used the startup folder for persistence.
Boot or Logon Autostart Execution:Registry Run Keys
It malware has used Registry Run keys to establish persistence.
Boot or Logon Autostart Execution:Registry Run Keys
MarkiRAT can drop its payload into the Startup directory to ensure it automatically runs when the compromised system is started.
Boot or Logon Autostart Execution:Registry Run Keys
Matryoshka can establish persistence by adding Registry Run keys.
Boot or Logon Autostart Execution:Registry Run Keys
Maze has created a file named "startup_vrun.bat" in the Startup folder of a virtual machine to establish persistence.
Boot or Logon Autostart Execution:Registry Run Keys
MCMD can use Registry Run Keys for persistence.
Boot or Logon Autostart Execution:Registry Run Keys
Metamorfo has configured persistence to the Registry ket HKCU\Software\Microsoft\Windows\CurrentVersion\Run, Spotify =% APPDATA%\Spotify\Spotify.exe and used .LNK files in the startup folder to achieve persistence.
Boot or Logon Autostart Execution:Registry Run Keys
Mivast creates the following Registry entry: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Micromedia.
Boot or Logon Autostart Execution:Registry Run Keys
MoleNet can achieve persitence on the infected machine by setting the Registry run key.
Boot or Logon Autostart Execution:Registry Run Keys
It saved malicious files within the AppData and Startup folders to maintain persistence.
Boot or Logon Autostart Execution:Registry Run Keys
Mongall can establish persistence with the auto start function including using the value EverNoteTrayUService.
Boot or Logon Autostart Execution:Registry Run Keys
Mosquito establishes persistence under the Registry key HKCU\Software\Run auto_update.
Boot or Logon Autostart Execution:Registry Run Keys
It has added Registry Run key KCU\Software\Microsoft\Windows\CurrentVersion\Run\SystemTextEncoding to establish persistence.
Boot or Logon Autostart Execution:Registry Run Keys
It has created the registry key HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\AdobelmdyU to maintain persistence.
Boot or Logon Autostart Execution:Registry Run Keys
It has modified a victim's Windows Run registry to establish persistence.
Boot or Logon Autostart Execution:Registry Run Keys
NanHaiShu modifies the %regrun% Registry to point itself to an autostart mechanism.
Boot or Logon Autostart Execution:Registry Run Keys
NanoCore creates a RunOnce key in the Registry to execute its VBS scripts each time the user logs on to the machine.
Boot or Logon Autostart Execution:Registry Run Keys
NavRAT creates a Registry key to ensure a file gets executed upon reboot in order to establish persistence.
Boot or Logon Autostart Execution:Registry Run Keys
Nebulae can achieve persistence through a Registry Run key.
Boot or Logon Autostart Execution:Registry Run Keys
The "SCOUT" variant of NETEAGLE achieves persistence by adding itself to the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Registry key.
Boot or Logon Autostart Execution:Registry Run Keys
NETWIRE creates a Registry start-up entry to establish persistence.
Boot or Logon Autostart Execution:Registry Run Keys
njRAT has added persistence via the Registry key HKCU\Software\Microsoft\CurrentVersion\Run\ and dropped a shortcut in %STARTUP%.
Boot or Logon Autostart Execution:Registry Run Keys
NOKKI has established persistence by writing the payload to the Registry key HKCU\Software\Microsoft\Windows\CurrentVersion\Run.
Boot or Logon Autostart Execution:Registry Run Keys
ObliqueRAT can gain persistence by a creating a shortcut in the infected user's Startup directory.
Boot or Logon Autostart Execution:Registry Run Keys
Octopus achieved persistence by placing a malicious executable in the startup directory and has added the HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run key to the Registry.
Boot or Logon Autostart Execution:Registry Run Keys
Okrum establishes persistence by creating a .lnk shortcut to itself in the Startup folder.
Boot or Logon Autostart Execution:Registry Run Keys
During Operation Dream Job, It placed LNK files into the victims' startup folder for persistence.
Boot or Logon Autostart Execution:Registry Run Keys
During Operation Sharpshooter, a first-stage downloader installed Rising Sun to %Startup%\mssync.exe on a compromised host.
Boot or Logon Autostart Execution:Registry Run Keys
It has added the path of its second-stage malware to the startup folder to achieve persistence. One of its file stealers has also persisted by adding a Registry Run key.
Boot or Logon Autostart Execution:Registry Run Keys
Pisloader establishes persistence via a Registry Run key.
Boot or Logon Autostart Execution:Registry Run Keys
PLAINTEE gains persistence by adding the Registry key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce.
Boot or Logon Autostart Execution:Registry Run Keys
PlugX adds Run key entries in the Registry to establish persistence.
Boot or Logon Autostart Execution:Registry Run Keys
PoetRAT has added a registry key in the hive for persistence.
Boot or Logon Autostart Execution:Registry Run Keys
PoisonIvy creates run key Registry entries pointing to a malicious executable dropped to disk.
Boot or Logon Autostart Execution:Registry Run Keys
PowerDuke achieves persistence by using various Registry Run keys.
Boot or Logon Autostart Execution:Registry Run Keys
PowerShower sets up persistence with a Registry run key.